messages from 2014-12-11 12:05:14 to 2014-12-16 16:31:18 UTC [more...]
Why do additional cores reduce performance?
2014-12-16 16:31 UTC (4+ messages)
[PATCH] kvm: iommu: Add cond_resched to legacy device assignment code
2014-12-16 15:47 UTC
[patch 0/3] KVM: add option to advance tscdeadline hrtimer expiration (v4)
2014-12-16 15:18 UTC (10+ messages)
` [patch 1/3] KVM: x86: add method to test PIR bitmap vector
` [patch 2/3] KVM: x86: add option to advance tscdeadline hrtimer expiration
` [patch 3/3] KVM: x86: add tracepoint to wait_lapic_expire
[patch 0/3] KVM: add option to advance tscdeadline hrtimer expiration (v5)
2014-12-16 14:08 UTC (4+ messages)
` [patch 1/3] KVM: x86: add method to test PIR bitmap vector
` [patch 2/3] KVM: x86: add option to advance tscdeadline hrtimer expiration
` [patch 3/3] KVM: x86: add tracepoint to wait_lapic_expire
[PATCH/RFC] s390/kernel: use stnsm instead of stosm
2014-12-16 9:32 UTC (3+ messages)
[PATCH] KVM: nVMX: consult PFEC_MASK and PFEC_MATCH when generating #PF VM-exit
2014-12-16 9:21 UTC (2+ messages)
[v3 00/26] Add VT-d Posted-Interrupts support
2014-12-16 9:04 UTC (28+ messages)
` [v3 02/26] iommu: Add new member capability to struct irq_remap_ops
` [v3 01/26] genirq: Introduce irq_set_vcpu_affinity() to target an interrupt to a VCPU
` [v3 03/26] iommu, x86: Define new irte structure for VT-d Posted-Interrupts
` [v3 04/26] iommu, x86: Implement irq_set_vcpu_affinity for intel_ir_chip
` [v3 05/26] x86, irq: Implement irq_set_vcpu_affinity for pci_msi_ir_controller
` [v3 06/26] iommu, x86: No need to migrating irq for VT-d Posted-Interrupts
` [v3 09/26] iommu, x86: define irq_remapping_cap()
` [v3 10/26] KVM: change struct pi_desc for VT-d Posted-Interrupts
` [v3 11/26] KVM: Add some helper functions for Posted-Interrupts
` [v3 12/26] KVM: Initialize VT-d Posted-Interrupts Descriptor
` [v3 13/26] KVM: Define a new interface kvm_find_dest_vcpu() for VT-d PI
` [v3 15/26] KVM: add interfaces to control PI outside vmx
` [v3 16/26] KVM: Make struct kvm_irq_routing_table accessible
` [v3 17/26] KVM: make kvm_set_msi_irq() public
` [v3 18/26] KVM: kvm-vfio: User API for VT-d Posted-Interrupts
` [v3 19/26] KVM: kvm-vfio: implement the VFIO skeleton "
` [v3 20/26] KVM: x86: kvm-vfio: VT-d posted-interrupts setup
` [v3 21/26] x86, irq: Define a global vector for VT-d Posted-Interrupts
` [v3 22/26] KVM: Define a wakeup worker thread for vCPU
` [v3 23/26] KVM: Update Posted-Interrupts Descriptor when vCPU is preempted
` [v3 24/26] KVM: Update Posted-Interrupts Descriptor when vCPU is blocked
` [v3 25/26] KVM: Suppress posted-interrupt when 'SN' is set
` [v3 26/26] iommu/vt-d: Add a command line parameter for VT-d posted-interrupts
` [v3 07/26] iommu, x86: Add cap_pi_support() to detect VT-d PI capability
` [v3 08/26] iommu, x86: Add intel_irq_remapping_capability() for Intel
` [v3 14/26] KVM: Get Posted-Interrupts descriptor address from struct kvm_vcpu
Why do additional cores reduce performance?
2014-12-15 23:33 UTC
Is a "KVM internal error" a bug?
2014-12-15 22:50 UTC (3+ messages)
[PATCH 1/3] vringh: 64 bit features
2014-12-15 21:14 UTC (2+ messages)
` [PATCH 2/3] vringh: initial virtio 1.0 support
[PATCH v3 0/2] VGIC early initialization initiated by user-space
2014-12-15 17:43 UTC (3+ messages)
` [PATCH v3 1/2] KVM: arm/arm64: vgic: vgic_init returns -ENODEV when no online vcpu
` [PATCH v3 2/2] KVM: arm/arm64: vgic: add init entry to VGIC KVM device
[PATCH kvm-unit-tests 00/10] report is nice, use it more
2014-12-15 15:11 UTC (15+ messages)
` [PATCH 01/10] x86: hypercall: add missing report_summary
` [PATCH 02/10] x86: pmu: report takes a fmt
` [PATCH 03/10] x86: vmx: better use of report
` [PATCH 04/10] x86: tsc_adjust: use report
` [PATCH 05/10] x86: svm: "
` [PATCH 06/10] x86: asyncpf: "
` [PATCH 07/10] x86: xsave: "
` [PATCH 08/10] report: add prefix support
` [PATCH 09/10] x86: use report prefixes
` [PATCH 10/10] arm: "
[PATCH] kvm-unit-tests: minor: remove unused variable
2014-12-15 15:01 UTC (2+ messages)
[PATCH v2 0/2] x86/arm64: add xenconfig
2014-12-15 14:58 UTC (5+ messages)
` [PATCH v2 2/2] x86, arm, platform, xen, kconfig: add xen defconfig helper
` [Xen-devel] "
nVMX MSR load/store feature
2014-12-15 14:08 UTC (5+ messages)
[GIT PULL 00/12] KVM/ARM Changes for v3.19 - Take 2
2014-12-15 12:08 UTC (14+ messages)
` [GIT PULL 01/12] arm/arm64: KVM: Don't clear the VCPU_POWER_OFF flag
` [GIT PULL 02/12] arm/arm64: KVM: Correct KVM_ARM_VCPU_INIT power off option
` [GIT PULL 03/12] arm/arm64: KVM: Reset the HCR on each vcpu when resetting the vcpu
` [GIT PULL 04/12] arm/arm64: KVM: Clarify KVM_ARM_VCPU_INIT ABI
` [GIT PULL 05/12] arm/arm64: KVM: Turn off vcpus on PSCI shutdown/reboot
` [GIT PULL 06/12] arm/arm64: KVM: Introduce stage2_unmap_vm
` [GIT PULL 07/12] arm/arm64: KVM: vgic: move reset initialization into vgic_init_maps()
` [GIT PULL 08/12] arm/arm64: KVM: Rename vgic_initialized to vgic_ready
` [GIT PULL 09/12] arm/arm64: KVM: Add (new) vgic_initialized macro
` [GIT PULL 10/12] arm/arm64: KVM: Don't allow creating VCPUs after vgic_initialized
` [GIT PULL 11/12] arm/arm64: KVM: Initialize the vgic on-demand when injecting IRQs
` [GIT PULL 12/12] arm/arm64: KVM: Require in-kernel vgic for the arch timers
[PATCH v2 0/6] Fix vgic initialization problems
2014-12-15 10:50 UTC (14+ messages)
` [PATCH v2 1/6] arm/arm64: KVM: vgic: move reset initialization into vgic_init_maps()
` [PATCH v2 2/6] arm/arm64: KVM: Rename vgic_initialized to vgic_ready
` [PATCH v2 3/6] arm/arm64: KVM: Add (new) vgic_initialized macro
` [PATCH v2 4/6] arm/arm64: KVM: Don't allow creating VCPUs after vgic_initialized
` [PATCH v2 5/6] arm/arm64: KVM: Initialize the vgic on-demand when injecting IRQs
` [PATCH v2 6/6] arm/arm64: KVM: Require in-kernel vgic for the arch timers
` [PATCH v3 "
[PATCH 0/5] Fix vgic initialization problems
2014-12-15 10:43 UTC (22+ messages)
` [PATCH 1/5] arm/arm64: KVM: vgic: move reset initialization into vgic_init_maps()
` [PATCH 2/5] arm/arm64: KVM: Rename vgic_initialized to vgic_ready
` [PATCH 3/5] arm/arm64: KVM: Add (new) vgic_initialized macro
` [PATCH 4/5] arm/arm64: KVM: Don't allow creating VCPUs after vgic_initialized
` [PATCH 5/5] arm/arm64: KVM: Initialize the vgic on-demand when injecting IRQs
nested KVM slower than QEMU with gnumach guest kernel
2014-12-15 9:41 UTC (6+ messages)
[question] lots of interrupts injected to vm when pressing some key w/o releasing
2014-12-15 9:40 UTC (6+ messages)
[PATCH] KVM: x86: reset RVI upon system reset
2014-12-15 9:32 UTC (14+ messages)
C group hierarchy and libvirtd
2014-12-15 8:22 UTC
[PATCH v15 00/11] KVM//x86/arm/arm64: dirty page logging for ARMv7/8 (3.18.0-rc2)
2014-12-15 7:28 UTC (12+ messages)
` [PATCH v15 01/11] KVM: Add architecture-defined TLB flush support
` [PATCH v15 02/11] KVM: Add generic support for dirty page logging
` [PATCH v15 03/11] KVM: x86: switch to kvm_get_dirty_log_protect
` [PATCH v15 04/11] KVM: arm: Add ARMv7 API to flush TLBs
` [PATCH v15 05/11] KVM: arm: Add initial dirty page locking support
` [PATCH v15 06/11] KVM: arm: dirty logging write protect support
` [PATCH v15 07/11] KVM: arm: page logging 2nd stage fault handling
` [PATCH v15 08/11] KVM: arm64: ARMv8 header changes for page logging
` [PATCH v15 09/11] KVM: arm64: Add HYP interface to flush VM Stage 1/2 TLB entires
` [PATCH v15 10/11] KVM: arm/arm64: Enable Dirty Page logging for ARMv8
` [PATCH v15 11/11] KVM: arm/arm64: Add support to dissolve huge PUD
Problem with KVM when using XSAVES in host
2014-12-14 15:55 UTC (2+ messages)
using cgroups with KVM
2014-12-14 11:10 UTC
[PATCH] kvm-unit-tests: VMX: Test MSR load/store feature
2014-12-14 1:05 UTC
[PATCH v4 3/3] KVM: nVMX: Enable nested msr load/restore feature
2014-12-14 0:36 UTC
[PATCH v4 2/3] KVM: nVMX: Improve nested msr switch checking
2014-12-14 0:36 UTC
[PATCH v4 1/3] KVM: nVMX: Add nested msr load/restore algorithm
2014-12-14 0:36 UTC
[kvm-unit-test PATCH] tscdeadline-latency: fix typo
2014-12-13 15:39 UTC
[stable request 3.4 3.10] nEPT: Nested INVEPT
2014-12-13 9:09 UTC (2+ messages)
odd number of VCPU and performance impact?
2014-12-13 3:57 UTC
[PATCH v2 0/6] Improve PSCI system events and fix reboot bugs
2014-12-12 21:04 UTC (8+ messages)
` [PATCH v2 5/6] arm/arm64: KVM: Turn off vcpus on PSCI shutdown/reboot
[patch 0/2] KVM: add option to advance tscdeadline hrtimer expiration (v3)
2014-12-12 18:35 UTC (14+ messages)
` [patch 2/2] KVM: x86: add option to advance tscdeadline hrtimer expiration
[PATCH 0/4] kvmtool: ARM: fixing initrd, serial IRQs and bzImage message
2014-12-12 15:19 UTC (7+ messages)
` [PATCH 1/4] kvmtool: ARM: fix initrd functionality
` [PATCH 2/4] kvmtool: ARM: allow level interrupts in device tree
` [PATCH 3/4] kvmtool: ARM: advertise 8250 IRQs as level-triggered
` [PATCH 4/4] kvmtool: remove warning about bzImage on non-x86 architectures
[PATCH kvm-unit-tests 0/6] resurrect API tests, let them run on 64-bit kernels
2014-12-12 13:41 UTC (7+ messages)
` [PATCH kvm-unit-tests 1/6] config: remove useless -D options
` [PATCH kvm-unit-tests 2/6] x86: api: fix bitrot
` [PATCH kvm-unit-tests 3/6] x86: api: avoid conversion from void* to uint64_t
` [PATCH kvm-unit-tests 4/6] x86: api: do not pass size==0 to KVM_SET_USER_MEMORY_REGION except to delete a region
` [PATCH kvm-unit-tests 5/6] x86: api: use try_main throughout
` [PATCH kvm-unit-tests 6/6] x86: api: allocate TSS region dynamically
[PATCH kvm-unit-tests 00/15] arm64: initial drop
2014-12-12 12:44 UTC (2+ messages)
[PATCH] kvm: coalesced_mmio: remove one redundant check inside of coalesced_mmio_in_range()
2014-12-12 1:24 UTC (4+ messages)
[PULL] virtio: virtio 1.0 support, misc patches
2014-12-11 23:45 UTC (6+ messages)
kvm-unit-tests: add tscdeadline-latency test
2014-12-11 18:39 UTC (4+ messages)
[PATCH] KVM: add KVM_CAP_VMX_APICV to advertise hardware apic-v support
2014-12-11 17:15 UTC (6+ messages)
[v2 00/25] Add VT-d Posted-Interrupts support
2014-12-11 15:45 UTC (7+ messages)
` [v2 17/25] KVM: kvm-vfio: User API for VT-d Posted-Interrupts
[GIT PULL 0/9] KVM/ARM Changes for v3.19
2014-12-11 12:04 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox